Wordpress SQLi — PoC

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

In order to understand the writing here, you need to read the previous explanation [https://medium.com/websec/wordpress-sqli-bbb2afcc8e94](https://medium.com/websec/wordpress-sqli-bbb2afcc8e94). If you got it, then we can jump to the part and solve the question e.g. how to update / insert our sql payload into `_thumbnail_id` post meta. ## PoC start - Login to your wordpress as author - Upload image - Remember ID of the image / media - Create post and set image as featured image (this creates `_thumbnail_id` post meta) - Remember the post ID ## Wordpress ≤ 4.7.4 XML-RPC In case of appropriate wordpress version then we can use the third vulnerability in this versions of wordpress [https://wordpress.org/news/2017/05/wordpress-4-7-5/](https://wordpress.org/news/2017/05/wordpress-4-7-5/) e.g. Lack of capability checks for post meta data in the XML-RPC API. This means that we can edit the value of `_thumbnail_id` with the following code ( 6 is the post ID and 5 is image/post ID ) $usr =...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息